T.R. Robinson's Blog, page 23

February 20, 2018

Computer Viruses – Spyware, Keylogger, Adware

[image error]Spyware and Keylogger malware have different aims to the usual computer virus. The intent, with both, is to illegally gain user information. Adware, usually, has an alternative primary purpose as discussed within the appropriate section below.


Note: As will be mentioned a number of times ‘Malware’ is the correct ‘umbrella’ term when referring to computer viruses. However, as, colloquially, the term virus is more readily understood, both will be used throughout discussions that relate to the topic.


Spyware

This is a particularly interesting type of malware because some so called spyware is actually valid and legitimate.


The aim for the malicious form of this virus is to either:



Obtain information about a person or organisation without their knowledge. (This information may be sent on to other parties. Spyware has been utilised in identity theft.); or (possibly also);
Gain control over a devise. (Again without the user’s knowledge.)

Note: It is not only computers that are vulnerable: Cyber criminals also target smartphones and tablets.


Legitimate Spyware

Naturally, the term ‘spyware’ will raise concerns in most user’s minds and so it should. However, there are legitimate spyware programmes.


Frequently, when downloading acceptable and useful software, a user gives authority to the suppling company to collect certain types of information e.g. location, internet use, sometimes such things as age, etc. (Users should carefully read the licence agreement to see exactly what information will be collected before agreeing to the download.) In these legitimate instances the purpose is to enable the supplier to provide relevant content, services and advertisements to meet the user’s perceived needs. As stated, the user will have agreed to this when confirming their acceptance of the license agreement. The software utilised is a form of spyware. This is also the type of software utilised for parental control programmes.


Note: Though corporate systems are not the subject of this discussion it is worth noting some businesses, especially where they handle sensitive material, may have spyware installed in corporate computers. Employee contracts should contain relevant clauses informing them of this.


Keylogger

As the name implies this type of software virus is a ‘keystroke logger’ (‘Keylogger’ is the shortened term). It monitors which keyboard keys a user strikes. Keylogger software can be both legitimate and malicious.


Legitimate: Employers may install keylogger software in their corporate computers to monitor usage (employee contracts should make this clear). Families may use it for parental control purposes. Law enforcement agencies may also use it to monitor/prevent illegal activity. Microsoft have also acknowledged the latest versions of Windows 10 have a built-in keylogger ‘To improve typing and writing services.’


Malicious: Without the user’s knowledge monitors which keys are struck on the computer keyboard. May be used to:



Obtain passwords.
Register bank, credit card, etc. details.
Study computer use.
Monitor user interactions.

Despite the name this software can also be manipulated to collect information from other sources besides the keyboard:



Clipboard content.
Screenshots.
Open programme/folder/window details. (Usually by means of a screenshot.)

Search engine enquiries.
Etc.

Note: Keylogger may be installed either utilising software or by hardware manipulation. It is the software version under consideration here.


Adware

Though it works similarly, in that it collects some user data, adware is slightly different to other types of spyware. The principle aim, as the name implies, is to display advertisements on the user’s computer/device. A mixture of pop-up windows; flashing advertisements and links to websites are normally used. It should be noted that many such advertisements do relate to legitimate products. Nevertheless, they can be very annoying and some consider them an invasion of privacy. And, of course, some are malware.


Users should be very aware of an advert that contains:



An ‘important’ ‘urgent’ message.
A free offer.
A statement that software needs to be downloaded to see content.

The advert may imply the user has to select either a ‘Yes’ or ‘No’ option to close it. Clicking either will probably result in some form of malware being downloaded. Users should simply CLOSE the window.


As always, users should exercise common sense and caution. Some also suggest they avoid interacting with flashing adverts.


What these viruses do

May install software designed to control the device.
May change computer settings. (To facility illegal/erroneous activity.)
May redirect browser to something unwarranted. (To facilitate criminal intent.)
May service pop-up advertisements. (Could be in combination with other aims.)

May also, probable will:



Track internet habits and use.
Register user Logins.
Collect personal information (e.g. bank and credit card).

How devices infected

Spyware, along with other types of malware, may be spread (downloaded) onto systems by a variety of methods including:



E-mail attachments.
Text message attachments. (Mobile devices i.e. smartphones and tablets.)
Social Media. (Through shared images; audio and video files; direct messaging; etc.)
App (software application) downloads. (Usually from unverified source.)
Malicious or compromised websites.
Rogue advertisements.
Infected software downloads.
Connecting an already ‘infected’ external storage devise.
Etc. (There are multiple sources a cyber criminal may use.)

Naturally, in all instances, the user is unlikely to be aware they are opening, viewing, downloading or connecting with/to erroneous, malicious or compromised material. Care should always be exercised when proposing to action any of the above.


Detection

This type of infection is not always obvious, in fact is probably rarely so and, consequently, is hard to detect. The user may notice their computer experiences:



Unwanted behaviour. (Does not work as it did.)
Degraded performance.
Failure to boot (start) properly.
Difficulty connecting to internet.
More frequent ‘crashes’.

As a consequence of the above a user may assume there is:



A hardware failure.
A Windows installation problem.
An internet connection issue.
Another type of virus attack.

Of course, all of the above may occur without an attack or infection. Nevertheless, users should be aware of the possibility.


Try not to panic: Some become so panicked they abandon their existing equipment and go to the expense of buying a new device. They should hold back because it is often possible for the situation to be rectified and for their equipment to be cleared.


Resolution

Spyware (technically the term includes Keylogger and Adware because they also collect user detail without the user’s knowledge) is an insidious type of virus. Some versions will also: Disable firewalls and/or disable a computer’s antivirus software and/or reduce browser security settings.


Once detected it may be necessary:



for all data to be backed-up; and then
for a full, clean, reinstallation of ALL software.

Naturally, having to take such action can be irritating but it is probably the only way to ensure the computer is completely cleared.


There are some, valid, software programmes users may download to help detect whether their device has been ‘infected’ and that may also help clear it. These will be discussed in more detail in a subsequent article to be published toward the end of this ‘Computer Viruses’ series.


Prevention

It is appreciated the following are consistently repeated within related articles but it is necessary to ensure users, for their own safety, continually bare the points in mind.



Avoid opening unverified e-mails or clicking upon links contained in them.
Avoid visiting unknown websites (includes blogs) or following links to one if it has been provided by someone not known or not from a recognised group.
Check social media sharable items are from a recognised/validated source.
Do not download software from an unknown company or source.
Do not download anything from an unconfirmed website or contained in an advertisement by unknown company or person (includes social media).
Do consistently backup files. (Suggested at least two or three backups on different devises that are stored in separate locations e.g. USB, Hard-drive backup devises, CD (for older computers) etc.)
Do regularly update software: programmes, applications, anti-virus systems, etc. (New versions of malware are constantly devised and detected and most software companies update their programmes to counter attacks from them (each new virus requires a new resolution). Not to regularly update the computer software may leave it vulnerable to attack from the newer viruses.)

Conclusion

Spyware of whichever type is insidious and dangerous because of the user details these are able to collect. It is often utilised in identify theft crime.


These viruses are hard to detect. Users should be aware if their device suddenly starts behaving in an unexpected manner.


The problem can usually be resolved though it normally requires a complete overhaul of the computer’s software.


Users should always employ careful consideration before opening spurious e-mails; e-mail or text attachments; linking to unknown websites or blogs; responding to unsolicited advertisements; interacting with social media shares, images or files; etc. especially if it is outside the user’s normal daily habit.


Disclaimer: The writer is not a computer programmer or in any other way a computer software expert. What is shared has been learnt through limited personal experience and/or through research. Consequently, though every effort has been made, total accuracy of all the above information cannot be guaranteed.

 •  0 comments  •  flag
Share on Twitter
Published on February 20, 2018 09:13

February 16, 2018

Tears of Innocence – What Readers Say

[image error]


This is a rare, in fact first ever, highlighting of a book by T. R. Robinson in this website blog. The reason for this break in website protocol is due to the positive comments, observations and reviews received which it was considered only fair to share with readers and visitors to the site.


To give an idea of what people have said, a selection of extracts from published reviews are provided below. Click on each extract to read the whole.


Note: Links to where the book may be obtained as well as the official book landing page will be found at the end.


‘A brilliant tribute to a brave and courageous woman you cannot help but admire more than any other writer whose biography I have read. Every woman should read this book and gain strength from it.’ ***** Lucinda E Clarke


‘I thought I had a good idea of the horrors of War, but what she went through at the hands of the Nazi’s was absolutely inhuman. 


So many times I felt as if I wanted to throw my arms around her and give her a hug. I admire the strength she had to carry on in her attempt to find happiness. I would recommend this book.’ ***** Jeanette


‘I read this memoir in little over 24 hours which is a true sign I was glued and captivated by this true story.’ ***** Julie Watson


‘I usually make notes when reading a book for review. It must be an indication of how engrossed I was when I barely made a note or highlighted sections.’ **** Pamela King/Pam Ferrari


‘What a powerful story of courage and overcoming.’ **** Catherine Townsend-Lyon


‘I liked this story because it was so real.’ **** Glenn Conley (Warning: Reviewer uses strong language.)


‘While this autobiography is steeped in family relationships, it’s also about war, politics, and daily lives changed by struggle. Perhaps this is one of the facets that leads Tears of Innocence to be so striking: the juxtaposition of inner strife with equally-challenging wider world changes:’ ****  D. Donovan, eBook Reviewer, MBR (Midwest Book Review)


Available From:

Note: Editions suitable for all devices (computer, e-reader (including Kindle), tablet and smartphone) available. Click on image or text to access.


[image error]


 


Amazon (Opens site for your location.)

(Paperback edition also available.)


 


 


[image error]


 


iBooks


 


[image error]


 


Nook


 


[image error]


 


Google Play


 


[image error]


 


Kobo


 


[image error]


 


Smashwords


 


 


Official Book Landing Page (Contains few more details of what readers may expect to experience.)

 •  0 comments  •  flag
Share on Twitter
Published on February 16, 2018 09:15

February 13, 2018

E-Mail Lists

[image error]


An e-mail list, as the title implies, is simply a collection of e-mail addresses a user may utilise to send information/material to multiple recipients.


Note 1: As usual, the topic will be considered from the perspective of an independent (indie) author though much would also apply to other online entrepreneurs and small businesses.


Note 2: The majority of authors will understand the topic of e-mail lists to be primarily related to the matter of newsletters.


Note 3: This is the second, subsequent, article referred to in Newsletters.


Undoubtedly readers of this article will be very interested in knowing how to go about building an e-mail list (a challenge for most authors) nevertheless, there are some important matters to be considered first.


Why have a list?

In the past authors were not really required to have direct contact with their readers (publishers did all the publicity work) however, modern society demands a different approach. Many now want more personal contact and prefer to receive news and information direct rather than through third party sites such as Facebook, Twitter, etc. Though, to some extent, famous, popular authors can afford to ignore the trend, indie authors really cannot. E-mail is the obvious means by which to fulfil this desire for direct contact. Naturally, before being able to comply, it is necessary to build a list of interested party e-mail addresses. ‘Interested’ is an important, essential, concept, as will be explained shortly.


Legislation

Prior to considering the building of an e-mail list the important matter of legislation must be taken into account.


Legislation prohibits marketing type material being sent through normal e-mail channels such as Gmail; Yahoo; Hotmail; etc. without permission (sending news and information about books and products is generally identified as being a part of marketing). Consequently, to enable the e-mailing of such information (usually in the format of a newsletter), authors need to obtain specific permission from their readers, fans and followers. To that end these people must be asked to subscribe to the service by voluntarily providing their e-mail address (subscribing is seen as granting permission for e-mails/newsletters to be sent to their e-mail inboxes). It is important authors note they must NOT add e-mail addresses without the person having specifically subscribed.


Legislation also requires there be an easy unsubscribe option. The subscriber must not be trapped into a ‘forever’ scenario.


In addition, legislation requires the sender’s physical address be included in each and every communication. Further information about this will be found under the section on ‘Privacy’ below.


Service Providers

As already explained under ‘Legislation’ above, standard e-mail channels may not be used to send marketing type material without permission. How such permission is obtained is the focus for this section.


Individually

Authors may simple ask readers etc. to forward permission to add their e-mail address to a list and for their agreement to news etc. (marketing material) to be sent to them accordingly. However, there are problems with such an approach:



No readily available collective evidence of subscription. (In this scenario permission will most likely have been in an individual e-mail filed away (hopefully) in an appropriate folder/file.)
Incorporating legislative requirement for an easy unsubscribe option. (Would require author to have a self-hosted website with appropriate programming ability and availability.)
Automatic clear inclusion of sender’s physical address. (Though may be drafted into a signature block the sender does not have to select that signature block – could be accidentally missed.)
Ability to produce clear, legally acceptable, evidence in the case of any dispute. (Disputes can and do arise.)
Time consuming. (Drafting individual e-mails, even if the bulk is copied from another, takes time.)

Corporately

The simplest and most effective way for authors to send news and information is by a newsletter that has the ability to be sent to multiple recipients in one go. To facilitate this many e-mail newsletter service providers have been established. Most require the payment of a fee (usually assessed by the number of recipients and the number of e-mails to be sent in a designated period). One or two also provide a limited free option for the individual user (e.g. not an incorporated business) such as an indie author. These free options tend to limit the number of recipients and e-mails to be sent but are a good place for most to commence. Upgrades may be obtained as and when necessary.


Authors are advised to use an e-mail newsletter service provider rather than attempt to go it alone because these:



Offer simple, clear, subscription/signup forms (more about them in a moment);
Automatically create a verified list;
Automatically include an unsubscribe option;
Automatically insert the sender’s address;
Provide readymade easy use templates;
Have the systems for unhindered bulk sending;
Provide some analytics/reports.

An internet search of ‘email newsletter service providers’ will present a list of companies. User’s should be able to find one that suits their purpose and budget. Some are notably very popular and appear to meet most authors requirements. None are specifically recommended here though authors may ask colleagues/fellow authors which they use and why.


Requirements

Bearing in mind, as mentioned above, the creating of an e-mail list is, in reality for most authors the setting up of a newsletter system, they will require to already have an author website or at least a blog. They must also ensure they meet all legislative requirements as detailed above. And, of course, to get started it would help if they already have an identifiable group of readers, fans and followers no matter how small it may be.


Privacy

Recipients: Authors etc. are responsible for maintaining recipients privacy, including their e-mail address. This is a serious matter that must be treated accordingly.


Senders: Legislation requires the actual, physical, address of a newsletter originator be included in each and every newsletter sent. It is usually printed in the footer section. This naturally poses some privacy issues, especially for the individual who works from home, as many do.


To reiterate: legislation requires an actual physical postal address to which physical mail may be delivered to be utilised. As already implied, there will be those who will feel vulnerable should they provide their own home address. For them there are suggested legislatively acceptable alternatives:



Use a business address (e.g. if they or someone they know has a small business and are willing, the business address may be used instead of the person’s own.)
Rent a PO box from the official post office or from a company that provides them (e.g. UPS (United Parcel Service) to name but one). Naturally there will be a fee payable but more importantly users should note some legislations require the PO Box holders actual address to be provided if a request for it is submitted to the post office or company . (The PO Box service usually requires the holder to provide their address for record and fee collection purposes.)

Sign-up/Subscription Forms

People are more likely to subscribe to a newsletter service if the process is quick, easy and clear. The sign-up/subscription form is therefore crucial. Whatever else, it should be immediately evident what the subscriber is signing up for and what they can expect and possibly also when (frequency).


Readymade forms are usually made available to users by newsletter service providers. As a rule these may either be used ‘as is’ or may be amended to suit the users own preferences. The mix of available forms means there is usually one that will suit requirements without adjustment but the ability to amend does provide for them being made more personal.


In addition, should the author wish, they may also add a few questions to obtain a greater understanding of what the subscriber is looking for in/expecting from the newsletter. Though this may be helpful, it should be born in mind subscribing should be a quick and easy process.


Positioning Forms

Within a website/blog the positioning of subscriber forms can play a vital part. Most systems enable forms to be placed in a variety places.


Pop-Up: This is the most common type that usually appears in the centre of a screen. (Systems allow users (authors) to chose frequency e.g. 5, 10, 15, etc. seconds. Frequency is important because authors will not want the pop-up to become irritating but at the same time do not wish it to be too long before it appears as the reader/visitor may have moved on prior to its appearance.)


Hover Bars: Users may choose whether the bar hovers at top or bottom of the screen as readers/visitors scroll through the site.


Box: A box just below the header with a sign-up form.


Side Column: Usually a static form. (Caveat: Apparently there is a common condition known as ‘side column blindness’. Suggested one of the other options is always employed even when a side column option is provided.)


RECOMMENDATION is for authors to intermix and change the position and style every few months so that it remains fresh and will continue to catch attention.


Note: It is believed the pop-up option is normally included with all packages however, it may be necessary to engage other companies/providers for the hover bar and box options (obviously at a fee).


Collecting e-mail addresses

This, for the majority is probably the most difficult aspect. Naturally, people are cautious about giving their personal e-mail addresses to a stranger. This is especially true now, when there is so much on-line abuse and cyber crime.


The simplest manner in which to collect subscribers is to ask friends, relatives, on-line contacts/friends, fans, followers, etc. to sign-up. It must however be accepted many authors shy away from such direct action. It must also be acknowledged some of these friends, etc. may not be interested in what the author has to share (everyone is different and must be allowed to be so). Nevertheless, provided not done in an aggressive manner, it may still be worth asking.


The most usual method employed by authors is to utilise their existing activity, in these days mostly on-line, to highlight the availability of the newsletter and to provide/insert links to sign-up forms:



Website/Blog.
Social Media. (Posts; Tweets; etc.)
Book Metadata. (With author information at back.)
E-mail signature blocks. (Along with website/blog url below name.)
Other forms of written communication. (Website/Blog articles/posts; Guest posts; Magazine articles; Letters; Publicity material; etc.)
With profile and biographical information. (Wherever it may appear.)

Incentives

Most will understand to simply add information/sign-up forms as indicated above will not necessarily result in subscribers and that sometimes it is necessary to include an incentive such as:



Showing the subscriber that in each newsletter they will receive valuable information.
Once subscription has been confirmed, they may download something useful e.g. an infographic on a topic that may interest them (e.g. ‘How to publish a book.’ ‘How to use a social media site.’ ‘A book marketing guide.’ Etc.)
A free gift for subscribing (e.g. Copy of one of the author’s books. A unique gift (e.g. a pen set or something similar.)

The positioning and timing of sign-up forms can also play an important role in attracting subscribers. See ‘Sign-Up/Subscription Forms’ above.


Un-subscribers

Regrettably there have always been those who will take advantage of others. A trend that, sadly, appears to be on the increase.


Offering an incentive to encourage people to subscribe has its positives but there is also a negative aspect. Authors, and others, sometimes mention and complain about people who sign-up but who, as soon as they have received the offered gift, will unsubscribe, some almost immediately. A truly frustrating and upsetting feature but one that has been and is common to the majority of marketers who utilise the gifting idea. Authors should not feel alone as this is part of marketing no matter whether an individual or a corporation.


Conclusion

Apologies again for the length of this article. Not ideal but having already separated the topics of newsletters and e-mail lists it was considered inappropriate to stretch the subject into a third article though of course it would have helped shorten each. Nonetheless, the desire was to do full justice to each subject consequently leading to the longer length.


Many state e-mail lists are an essential for authors and of course, it must be acknowledged, they are very useful. Particularly so when it comes to sending newsletters. Nevertheless, it is not for everyone. The time commitments and privacy issues will be seen as a problem to some.


If an author does decide to build an e-mail list they must take into account the matter of legislation and privacy and should bare in mind the need for clear, friendly, easily accessible sign-up forms. They also need to be prepared for the time commitment and for peoples characters by not taking matters too personally e.g. un-subscribers.

 •  0 comments  •  flag
Share on Twitter
Published on February 13, 2018 09:10

February 9, 2018

Catching the Light: Four women, four compelling short stories by Mary Grand

[image error]


Principally, as stated in the sub-title, the book comprises four short stories about different women however, it also includes an introduction to the author’s novel ‘Free to Be Tegan’.


It is difficult to do justice to this series of short stories without including spoilers which, would be a real shame for prospective readers. Each story is based upon the emotional and psychological experiences of the four different women each story is based upon. Though, fictional, it must be said many women would be able to identify with the protagonists and their plights.


The writing style is deceptively simple because it quickly draws the reader into the tale and engages their emotions without them really noticing until pass the first page or two. These stories could easily be biographical and draw out many experiences some readers will be able to identify with, regrettably not all positive. One story contains an element of what appears to be fantasy but in such a realistic manner as to produce a satisfactory end (the writer of this review, through their own experience, was able to particularly identify with this, one of the more disturbing tales).


This is an enjoyable collection written in an easy style that carries the reader along without effort. Anyone interested in women’s emotions and how they view their, sometimes unenviable, situations will enjoy this book. The extract from the beginning of the author’s novel ‘Free to Be Tegan’, that follows the four short stories, does not disappoint as it shows a different perspective to one young woman’s challenges and certainly wets the readers appetite to read the complete story.


It is a shame more cannot be said without the danger of including spoilers but then these are short stories that may be read easily within one sitting.


Four stars (4*).


Book is available in paperback, digital (e-book) and audio formats.


Amazon.com                  Amazon.co.uk

 •  0 comments  •  flag
Share on Twitter
Published on February 09, 2018 09:15

February 6, 2018

Newsletters

[image error]This topic, as is often the case considering the overall intent for this website, will be approached from the perspective of an independent (indie) author. Nevertheless, much will also be of interest to other on-line entrepreneurs; small business users; etc.


Note: The original intent for this article was to combine the topic of newsletters with the why and how of building an e-mail list (utilised for the distribution of newsletters). However, doing so would make the article very lengthy; not to be desired when so many are more than busy. Consequently, the topic has been separated into two parts: This one will look at the ethos of newsletters while the eventual second part will consider the building of an e-mail list.


Why have a newsletter?

Whereas, in the past, authors were not really required to have direct contact with their readers (publishers did all the publicity work) modern society demands a very different approach. Present-day fans and readers, generally, want to know who the person behind the story/book is. They like more personal information about life, habits, likes, dislikes, hobbies, knowledge, etc. Though, to some extent, famous, popular authors can afford to ignore the trend, indie authors really cannot. Of course, social media obviously provides opportunities to share some details of an author’s life etc. however, as detailed further on, newsletters have distinct advantages.


Aim?

Creating regular newsletters is a time consuming occupation. Authors therefore need to carefully consider why they would want to do it.



What would be their overall aim (what would they want to accomplish)?
Who would they want to reach (type of reader/person)?
What would they want to promote (project, website/blog, book, etc.)?
Realistically, what content could they include (personal, book related, knowledge. etc.)?
What subject matter would help achieve their identified purpose (as above)?
Would they want/need more than one type of newsletter (divided by interests etc.)?

Of course, the above is not infinite, an author may have a completely different take on the matter. Nevertheless, the important thing is for them to sit down beforehand and ensure they understand what they want and what it is going to take to try and hit the target. Time is a commodity not to be played with.


Social Media v Newsletter

Throughout the years, since the advent of free digital publishing platforms (and prior for business corporations), indie author’s will have seen consist advice to grow an e-mail list, primarily for the purpose of distributing newsletters, as part of their publicity and marketing campaigns. (The topic of building e-mail lists will be dealt with in a later article.) Why, when there are so many other options for communicating with their readers and fans (e.g. social media) should an author even consider a newsletter? The principle differences between the main two available options (social media v newsletter) will now be considered.


Social Media

Many ask why go to the bother of newsletters when there are so many opportunities to share information, updates, knowledge, etc. through sites like Facebook; Google Plus; Twitter; Goodreads; etc.


The first think to note is NEWSLETTERS ARE NOT A SUBSTITUTION for social media but an addition to/enhancement of it. To only rely upon newsletter distribution would be a mistake.


However, there are limitations to social media:



Many sites frequently change the algorithms utilised to determine who sees each post. (Usually reduces the number.)
Posts are transient (quickly passing through) thereby giving readers little time to see them e.g. Twitter.
The most popular sites have billions of active users which, understandably, results in many posts becoming lost among the ‘noise’.
Users have no control over a site. (The company may collapse, with the loss of all material, or may have to reduce their market share for some reason or other.)
There remain a number of people (admittedly mostly in the older range) who are not active in social media.
Unless commented on, shared or liked, there is no record of who has seen a post. (Consequently, authors are unable to follow up or build a relationship with them.)

Newsletter

These have many advantages over social media though again it is stressed they are not a substitution.



Personal: Effectively a one-to-one communication. (Though sent out in bulk the recipient is receiving a personal copy.)
Have a degree of permanency unlike social media posts. (Remains in recipient’s inbox for them to open and read whenever they choose.)
The recipient wants the information. (They had to choose to subscribe to the newsletter.)
Content may be geared to recipient’s interests.
Recipient knows they are not going to be inundated with unwanted communications. (As likely after liking/following etc. a post or someone in social media.)
Contain unsurescribe options. (Recipient will feel, and be, in control.)
Less aggressive than other forms of marketing. (Though on a different level and hopefully more personal, newsletters are still part of marketing.)
More effective in establishing long term reader/fan relationships.
May build a reputation for quality.
Keeps name and products (books) in front of readers/customers.
Those who are not active in social media are more than likely to have an e-mail account (modern society, especially utilities and some banking services, make it almost a requirement). They may still be interested in hearing about an author’s new book or other product(s).

The above list is simply an attempt to highlight the more obvious benefits, of course, there are bound to be other advantages readers of this article may readily think of.


Format

It is an accepted fact in today’s society that most people, even those supposedly retired, are busy. Time is accordingly a factor to be always kept in mind. In addition, many often comment upon having overfilled e-mail inboxes. Authors therefore need to consider length and structure for their newsletters. They should neither be too short to contain anything of real interest or so long that the reader tires of trying to get through all the content.


Most e-mail newsletter service providers (anticipated author will be using one) (more about them in the subsequent article relating to building an e-mail list) have readymade templates available. These should provide the author with some guidance, at least as to structure.


From the start, authors should try and decide upon an optimum length as well as structure and, as far as possible, stick to it. Doing so will create a familiarity for the recipient and allow them to know what to expect (thereby enabling them to judge reading time). Of course, it is accepted there may be some element of trial and error when first establishing a newsletter and consequently, some changes may be required. Nevertheless, authors should try and determine upfront what they are going to aim for.


Content

When determining content for newsletters authors should take into account:



What, overall, they want to achieve.
What they anticipate readers will be looking for.
What they normally share in their website/blog.
What their books are generally about.
What information they want/do not want to share.
Etc.

As with anything where there are multiple recipients, it can be difficult to determine what readers are looking for: the uniqueness of each individual means what one likes/enjoys another may not. It may therefore help if the author includes, at the end of the newsletter, a request for readers to let them know what they liked/did not like. It may also help if subscribers are asked for information about their interests when they subscribe (more about that in the next forthcoming article regarding the building of e-mail lists).


Frequency

Again the aspect of a recipients time and full inbox must be taken into account. The author should also take into account their own time availability; drafting a newsletter is not a quick easy task.


Some suggest:


Bimonthly or Quarterly: Too infrequent. (Recipient may have forgotten that they have subscribed and may simply unsubscribe when a newsletter unexpectedly turns up.)


Weekly or Daily: Unless contains real important new news, too frequent. (People will become fatigued and possibly annoyed and may consequently unsubscribe even if they have found the newsletter of interest before.)


Monthly: Considered optimum frequency. (Not so long as to allow to be forgotten or so frequent as to become irritating.)


Naturally, it is for the author to determine (taking into account what they infer readers want) frequency. However, whatever frequency they decide upon they should be consistent. Of course, if some important interesting news arises they may consider sending an additional, interim, letter but this should not occur regularly. They will build a mistrust if it does.


Legislation

This is just a quick note on the subject. Fuller consideration, or perhaps repetition, will be included with the subsequent article regarding the building of e-mail lists.


If an author, entrepreneur, business, etc. wishes to regularly communicate with (market to) readers, fans and customers, they are obliged to use a newsletter format. Legislation prohibits marketing type material being sent through normal e-mail channels e.g. Gmail; Yahoo; Hotmail; etc. without permission. (As previously mentioned, newsletters tend to form part of authors publicity and marketing campaigns.) By actively subscribing to a newsletter the recipient is seen as granting permission for it to be sent to their e-mail inbox.


Legislation also requires newsletters include an easy unsubscribe option.


Privacy

Recipients: Authors etc. are responsible for maintaining recipients privacy, including their e-mail address. This is a serious matter that must be treated accordingly.


Senders: Legislation requires the actual, physical, address of a newsletter originator be included in each and every newsletter sent. This naturally poses some privacy issues for authors etc. (More about this and ways to possibly deal with the issue will be shared in the subsequent article regarding the building of e-mail lists.)


Roundup

Newsletters are a useful means for more personal communication between author and reader/fan/follower.


A severe time commitment is required meaning authors should carefully consider whether newsletters are a realistic option for them.


There are legislative and privacy issues that must be taken into account.


If the option is taken up, authors need to be consistent with format, content and frequency.


Further/additional information and detail will be included in a subsequent article regarding the building of e-mail lists.


Apologies for the length of this article, despite attempts to shorten it by splitting information into two parts, but it was considered important to include all the above information here.

 •  0 comments  •  flag
Share on Twitter
Published on February 06, 2018 09:12

February 2, 2018

Julie Watson – Interview

[image error]


 


Welcome Julie Watson

Author of Born for Life: A Midwife’s story


(Links to where the book may be found are at the end of this interview.)




 


 


Please tell us a little about yourself.

I grew up in a small, rural town in New Zealand. After leaving school at the age of sixteen, I worked at the local maternity annexe as a nurse aide. I married young and life was happy until the death of my second baby at birth. This led to depression, loneliness and despair, which lasted many years. It was during this time in my life that I became a Christian. I studied to be a nurse and midwife in my late thirties – fulfilling a lifelong dream. As a midwife, I have worked in many countries and continue to work as a midwife, which I still enjoy. I have three adult children and seven grandchildren and live in Palmerston North, New Zealand with husband, Barry.


What first inspired you to write?

I had been through quite a bit in my life and it had been challenging. I had suffered a lot from depression and self-doubt.


It was my daughter who suggested I write a book as I had a lot of time on my hands while working in rural Australia. I thought about it for a while and then decided to take up the challenge.


In what genre(s) do you prefer to write?

I only write memoirs or true-life experiences I have had.


Are you working on another book?

Yes, I am! I have written another book about my time working in Africa at Kalene Mission Hospital. The book is called ‘Born for Life: Midwife in Africa.’ It will be published in the middle of this year (2018).


If your books have required research: What do you consider the best resources?

I write from my memory and journals I have. Also the Internet if I need to. Google is great.


Do you consider your books convey messages to readers?

My first book, Born for Life: A Midwife’s story gives a message of hope, faith and love. Persevering against the odds and realizing your dreams if you don’t give up.


Born for Life: Midwife in Africa, tells stories of African women and the challenges they face when bearing children. It gives a glimpse into their life and their plight.


What advice would you give to authors who are just starting out?

I think to be aware it takes a lot of commitment, time and energy. You can do it if you put your heart and soul into it. First there is the writing, then the publishing and then the marketing. All areas need your total commitment and it is ongoing. If you have a passion for writing and don’t give up, it will all be worth the effort. Also there is a lovely, supportive community of authors online that will help you on your journey.


Biographies, autobiographies, memoirs: What advice would you give, about using real names and descriptions, to authors who write in these genre? I ask because many raise concerns about the issue.

I think to be truthful and write from your heart. I used real names except for the women I cared for. I didn’t defame anyone but I was a bit nervous about using real names. In the end I decided I was going to, no matter what the consequences.


Do you self-edit or do you think a book should only be professionally edited?

I write the first draft. As they say, just write. I have a bit of an idea of chapters and how the story is going to unfold.


I then edit multiple times until I feel I cannot improve the manuscript any further.


I then endeavor to get beta readers to read and comment on the book. I did have a manuscript assessor the first time and that worked well.


I then get a professional editor to edit the book. This is a step you cannot skip, as it is so important to have this done. (I am fortunate to have my daughter as an editor, which has been extremely valuable.)


How do you go about marketing your books?

I try and interact with others online and build up a presence on social media. About once or twice a year I do a promotion and pay one or two promotion sites to promote my book at a reduced price.


How important do you think reviews are?

I think they are very important, especially the first ten. When you get that many I think you can relax and they come slowly but surely.


If you consider reviews important, how do you go about obtaining them for your books?

With my first book, I literally asked people who bought my book. I then acted on suggestions from books I read or blog posts. It can be quite frustrating when people don’t review your book but it is common. Only a small percentage of readers review a book. You can do a Goodreads giveaway or a promotion. I have read a lot of books about all areas of writing but in the end you do what you feel comfortable with.


Do you have a preferred genre for when you read?

I enjoy reading true-life stories and read mainly in the genre I write. So I read memoirs and biographies mostly.


This is an age old question but one I consider of interest. If you were stranded on a desert island, which three books would you like to have with you?

Gone with the Wind as I loved the movie.


The Bible.


Naked and Marooned by Ed Stafford for suggestions on survival.


Please share with us links to where readers may obtain more information and insight into who you are.

Amazon Author Page


Facebook


Google Plus


Twitter


Goodreads


Pinterest


Thank you Julie for sharing your story with us.

[image error]


 


Review

 •  0 comments  •  flag
Share on Twitter
Published on February 02, 2018 09:23

January 30, 2018

Computer Viruses – Ransomeware & Scareware

[image error]


 


Note: As will be mentioned a number of times ‘Malware’ is the correct ‘umbrella’ term when referring to computer viruses. However, as, colloquially, the term virus is more readily understood, both will be used throughout discussions that relate to the topic.


 


Ransomeware

Ransomware is just one of many different types of virus a user may encounter. It is malicious software that usually threatens either:



To publish user data. (Thereby threatening their privacy and date security.)
To permanently block access to user data and/or computer unless a ransom is paid. (No guarantee the block will be removed even if payment is made.)

Cyber criminals generally utilise one of the following to achieve their aim:



Locking the computer screen – Most frequently with a full screen message that prevents the computer being used and includes instructions on how the user may pay for their system to be released.
Encrypting files – Prevents access without a ‘key’. The message usually includes a threat to delete the files if a ransom is not paid for the ‘key’ (normally a numeric code). (Again, no guarantee the code will be provided even of the ransom is paid.)

An alternative to the above is for fake anti-malware scanning results to be displayed in the hope of getting users to purchase bogus anti-malware software. (Of course, the bogus software will undoubtedly incorporate malware/viruses.)


How spread

Ransomware can be spread (downloaded) onto systems by a variety of methods including:



Visiting malicious or compromised websites.
Opening attachments to spam e-mails.
Opening/viewing malicious advertisements.
Downloading infected software.
Connecting ‘infected’ external storage devises.
Etc. (The above are the most common sources but not the only ones.)

Naturally, in all instances, the user is unlikely to be aware they are opening, viewing, downloading or connecting with/to erroneous, malicious or compromised material. Care should always be exercised when proposing to do any of the above.


Scareware

There are a number of different malware types with, naturally, differing names even though some, in effect and impact, are similar. Some name types are no longer encountered on a regular basis nevertheless, it is worth mentioning a few as they will undoubtedly arise from time to time (perhaps under a different description but nonetheless, with the same effect).


Scareware is another form of ransomware. It works by warning a computer and/or its files have been infected. These messages tend to appear to be from legitimate computer/antivirus software companies. The intent is to frighten, shock or cause anxiety to the computer user to such an extent that they rush to pay a demanded fee to quickly fix the problem. This normally results in the downloading of fake antivirus software. What is downloaded is actually malware that is intended to steal personal data (including bank and credit card information and passwords). Sometimes, though rarely these days, the ‘software’ is simply non-functioning.


Note: Users should be particularly aware when tired because it is at those times the brain does not always function clearly and they are more prone to panic and to take an action without forethought.


Purpose

As with most crimes, the cyber criminal behind the virus attack wishes to control and/or extort money from unsuspecting, innocent, computer users. Regrettably, such crime, well in truth personal crime of all sorts, is on the increase. A sad reflection upon modern society.


Prevention

It is appreciated the following are consistently repeated within related articles but it is necessary to ensure users, for their own safety, continually bare the points in mind.



Avoid opening unverified e-mails or clicking upon links contained in them.
Avoid visiting unknown websites (includes blogs) or following links to one if it has been provided by someone not known or not from a recognised group.
Do not download software from an unknown company or source.
Do not download anything from an unconfirmed website or contained in an advertisement by unknown company or person.
Do consistently backup files. (Suggested at least two or three backups on different devises that are stored in separate locations e.g. USB, Hard-drive backup devises, CD (for older computers) etc.)
Do regularly update software: programmes, applications, antivirus systems, etc. (New versions of malware are constantly devised and detected and most software companies update their programmes to counter attacks from them (each new virus requires a new resolution). Not to regularly update the computer software may leave it vulnerable to attack from the newer viruses.)

Some also suggest being particularly aware of e-mails that purport to be from Microsoft and have attachments advising the recipient to enable macros to view the content. (This may be an older problem but it is worth mentioning, just in case.)


Avoiding all of the above can be difficult for independent authors who wish to connect and interact with their fellows. The rule of thumb is to always try to first ascertain whether the person, website, etc. is genuine. However, sometimes there is little choice but to take the chance.


Initial action

There are some initial actions a user may take when confronted by one of these malicious software viruses.



Close the browser by using CTL-ALT-DELETE or equivalent. DO NOT click on any alternatives within the pop-up or message such as ‘NO’ “CANCEL’ or the usual ‘X’ in top right corner. Doing so could result in activation of malware and damage to the computer system.
If cannot close browser as above, go to Task Manager or equivalent and click ‘END TASK’.
If neither works: Try turning computer power off.
If all of the above fail: Contact the anti-virus software company utilised for the computer. (Hopefully, users have the company’s details recorded elsewhere. If not, utilise a different device, if available, to search for contact details, preferably telephone as will need fairly immediate action.)

Once the browser (Google; Firefox; Edge; etc.) has been closed, and if not done simultaneously, the computer should be shut down. When turned back on, users should ensure a full antivirus scan is run. (Most antivirus software systems have the option to manually request a scan – use the full scan facility rather than the ‘quick’ option.)


Subsequent Action

A lot of malware operates by adding applications and/or programmes to the computer system. Once the user has regained access they should check the installed programme list for ones that have been installed without their knowledge or authority. If any are found they should be uninstalled. Programme lists may be found via the computer’s control panel or equivalent. There should be a simple ‘uninstall’ option available.


After doing the above users should also check browser programmes for any malware installed in them (these will not show in the computer’s own programme list). Where more than one browser has been used, even if only once, ALL should be checked. From the browser menu the user selects the appropriate option: ‘Tools’; ‘Add-ons’; ‘Extensions’ or a combination. In Chrome it is Tools>Extensions. In Firefox it is Add-ons>Extensions. In Safari (Mac) Preferences>Extensions. In Microsoft Edge it is Extensions. Within each there is the facility to uninstall unwanted or erroneous software.


Conclusion

Ransomware is perhaps the most common virus the majority of users will encounter though there are others that arise fairly frequently.


As with most criminal activity, the intent is to frighten, scare and rob the victim. In these instances by trying to extort money or to take an action that gives unauthorised access to personal data for malevolent purposes.


As with most such issues, whether they be computer or say home related, careful consideration should be exercised before taking any sort of action, especially if it is outside the user’s normal daily habit.


When confronted with a locked screen, fake message or spurious scan results it is important NOT TO PANIC. The cyber criminal is hoping to push the user to take unwarranted, and probably costly, action.


In most cases taking the initial and subsequent actions suggested should deal with the problem.


Disclaimer: The writer is not a computer programmer or in any other way a computer software expert. What is shared has been learnt through limited personal experience and/or through research. Consequently, though every effort has been made, total accuracy of all the above information cannot be guaranteed.

1 like ·   •  0 comments  •  flag
Share on Twitter
Published on January 30, 2018 08:45

January 26, 2018

Finding Books to Read

[image error]


To coin an old phrase the following may appear to be ‘teaching grandma to suck eggs.’ In other words telling people something they already know and perhaps better than the writer. Nevertheless, a few, especially those new to the topic, may find some of the following information helpful.


Note: The origins of the above phrase are not known. There is a suggestion it comes from a 1707 translation of a Spanish author’s quote. But no one really appears to know.


In these days when there is a plethora of self-published books it is increasingly difficult for readers to find their next reads, or at least, ones they feel they can trust to be of reasonable quality. Added to that is the fact, with so many books in the market, it may take a reader considerable time to plough through all the options. Time, as most will acknowledge, is at a premium for the majority in these days of undisputed busyness. Hopefully, the following thoughts, ideas and suggestions will assist in reducing a reader’s book searching time.


It does not take much brainstorming to realise there are now multiple avenues for discovering books. Consequently, this discussion will be broken down into identifiable resource categories: Internet; Social Media; Websites/Blogs; Online Retailers; Bestseller Lists; Traditional.


Internet

As the internet now tends to be the first ‘go to’ for the majority of citizens, this option will be considered first. Most will be familiar with the available search facilities.


Specific Search Terms

A reader may utilise a number of different categories when searching for a book to read. For example: Genre; Topic; Author; Similar Book Title; etc. Entering any of these in a browser search bar will bring results but there are some limitations to note:


Genre: To obtain sensible results the search term needs to be comprehensive. Simply entering ‘Adventure’, ‘Memoir’ etc. on their own will return a number of results not related to books. To limit the information to books, the phrase should be enhanced with the addition of ‘Book(s)’ e.g. ‘Adventure Books’, ‘Memoir Books’ and so on.


Topic: The same principle as identified under ‘Genre’ above applies e.g. searching ‘Car Maintenance’ will return information that includes car maintenance companies and websites. To limit the result to books on the subject the term should be extended to include ‘books’.


Author: Author name only in a browser search bar will usually limit the result to their website and/or blog url and a list of their books. Of course, this may be what the reader is looking for but sometimes they may be using the name to find other books in the same genre.


Similar Book Title: For example, if a reader has enjoyed a previous book in a given genre, they may decide to use the title to find similar books. However, searching a specific title usually returns information related to that specific book only.


General Search Terms

Phrases such as ‘Finding books to read’, ‘How to find books to read’ will provide extensive lists of book websites, blogs, companies, recommendation sites, social media sites, etc. However, in the majority of instances, these are not limited to specific genres, topics, authors, etc. Consequently, there is no real saving of search time. In fact, it will probably increase it as the reader would need to look at each, or at least, a selection, of the results.


Text Search

Within Google, and presumably other browsers, it is possible to search actual text whether known or perceived e.g. ‘as the knife went in’, ‘his fist struck’. However, users should be aware the search is usually conducted using the individual words or a combination e.g. ‘fist’, ‘struck’, ‘fist struck’. Consequently, definitions and meanings for the individual words will be included in the result along with books where the word/phrase appears in their title or content.


Social Media

Several social media sites such as Facebook; Google Plus; Goodreads etc. Have groups and communities (together referred to as ‘groups’ hereafter) dedicated to specific interests. Books are no exception.


Note: It has been assumed most readers of this article will be familiar with the social media sites mentioned and therefore links have not been provided.


There are groups dedicated to books in general within which members may share whatever interests them about books. On the other hand many groups, well most, are more specific. Some are all about reviews (members may add, or comment upon, a book review). Some are genre specific e.g. in Facebook there are groups limited to memoir. There are also book club groups where a reader may discover reviews and recommendations. Depending upon how it has been set up a reader may either simply visit a group to see what has been posted within it, or, as is more usual, either ‘follow’ or ‘join’ the group. Most of these groups should provide the reader with a wealth of recommendations and ideas. Readers may also like to consider groups principally dedicated to authors rather than books because inevitably books (published or about to be published) will be mentioned.


Naturally, readers should consider reviews however, they should note: Reading is a subjective experience. What one person likes another may hate. There is also the aspect that some people do not really know how to format a review and that some may have been influenced by the person being a friend or relative of the author. Where they exist, a cross section of reviews will usually prove valuable for gaining an idea of the book’s content and quality though, as said, these should not be unconditionally relied upon.


Twitter and other similar social media sites may also prove useful. A search of different terms and names will bring up a list of Twitter accounts and tweets which may provide further information about the sort of book a reader is looking for. Again, there are some accounts dedicated to specific genre and authors but some are also mixed.


Note: Readers need to be careful about being distracted by the considerable number of related and unrelated tweets: remember the originating idea is to reduce book searching time.


Websites/Blogs

There are many websites and blogs dedicated to books especially reviews. It may prove worthwhile to check, where there is one, the bloggers review policy: these should give a clear idea of the type of book the reviewer favours. These websites and blogs will usually show up in book related search results.


Online Retailers

Amazon; iBooks (iTunes); Google Play; Barnes & Noble; Kobo; Smashwords; etc. all have genre, author, title, ISBN, etc. search facilities. Those books fully meeting the search criteria will be displayed first with other, sometimes apparently unrelated, titles following. It must be acknowledged these searches are useful. There is also the advantage, particularly with Amazon, that similar books and other books purchased by the readers of that searched are also displayed, giving the user further options to consider.


Note: Even Microsoft Store now has a book section.


Bestseller Lists

Some suggest readers not take too much notice of bestseller lists, wherever they appear, because a book may have only ended up in one due to extensive and aggressive marketing. Of course, this does not mean the book is not good but it may overshadow other good titles that did not make it into the list. It has to be said, the advice appears a little draconian: it would still seem sensible to at least give bestsellers a quick consideration.


Traditional Routes

Many, if not most, readers will acknowledge, even in these days of digitisation, they still enjoy the sensation (touch, aroma, sight) of a physical book. They will also still enjoy the pleasure of:



Browsing bricks and mortar book shop shelves (new, secondhand, charity);
Visiting libraries;
Looking though friends and relatives book collections;
Friends (actual and online) and family recommendations;
Perusing newspaper, magazine and poster book advertisements.

Conclusion

Avid readers are always on the look out for new books to read. However, they do not have endless time in which to look for them. The advent of the internet has enabled the process to be speeded up if the reader follows some basic principles.


No matter where looking there are some general search categories that may be utilised e.g. Genre; Topic; Author; etc. The limitations mentioned elsewhere should be born in mind.


Social Media groups and online retailer lists may prove useful and provide unexpected alternatives.


Reviews and bestseller lists should be considered circumspectly.


People should not forget the enjoyment of browsing: physical book shops; friends book shelves; libraries; etc.


Afterthought

There is always something new to learn and readers are recommended to consider ‘something new’ e.g. a book in a completely different genre or on a different topic to that normally read. They may find themselves surprised.

1 like ·   •  0 comments  •  flag
Share on Twitter
Published on January 26, 2018 09:11

January 23, 2018

Facebook – News Feed Changes

[image error]


 


As most Facebook users (over two billion) know, Facebook frequently reassess the algorithm they utilise for deciding which posts to display to a user. A further change is now (January 2018) to be introduced. What is changing? How will it impact users?



What is changing?
Prioritising posts

It is intended the following will be given priority:



Posts by friends and family;
Posts that friends and family have interacted with;
Posts with higher levels of comments, shares and likes;
Posts the user has commented on, shared or liked;
Posts that have generated substantive interaction.

Note: The principles outlined in Facebook – Engagement Algorithm – Changes will still apply in most instances.


Intention

To reduce passive content. (Articles, videos etc. where there is no or little demand upon a user except to read or view the content.)
To limit viral videos, news articles etc. shared by media companies;
To reduce fake news posts;
To prevent, as far as possible, misleading or misinformation posts;
To create a more positive experience for users. (Apparently, some scientific research has shown users who only experience passive content feel more negative than those who interact with articles and posts. Users are more likely to interact with posts and articles by friends and family which is one reason these are going to be prioritised.)

Facebook has faced criticism and legal questioning about how newsfeeds may have prioritised misleading and misinformation content and how this may have influenced such things as the last presidential election. The company acknowledges Russian agents used Facebook to influence the electorate. (Readers should note Facebook is not alone in this: other social media companies are being quizzed on the same topic.)


Note: A while ago there was mention of Facebook separating personal and commercial posts and articles. This change is clearly intended to support that goal.


How will it impact users?

In surveys, users have frequently commented, or perhaps that should be complained, that the site appeared to have shifted focus from friends and family content to increasing amounts of posts from brands, publishers and media companies. This latest change is designed to address the issue.


General and private (personal) users

Facebook’s product manager’s mandate has now been changed so as to:



De-emphasise ‘passive content’;
Promote ‘meaningful interaction’ with friends and family.

Elsewhere the aim of this change has been stated to be: ‘To promote meaningful interaction between people’ rather than ‘Helping people find meaningful content.’ In other words, seeking to provide what users actually want rather than guessing at it.


As will be more than obvious from the above information, general users will now see more of what they have said they want: posts and articles from friends and family. It has to be admitted, though, in general, less news worthy material will now be displayed, most users will be pleased with this outcome.


A rather broad brush has been applied and it may be some general users would still prefer to have posts from news media companies etc. included in their newsfeeds. This can still happen but only by the user’s choice: user’s have the option to select and prioritise what they see. Here is how to find the prioritising facility:



Sign in to Facebook;
Go to ‘News Feed’ (Near top of righthand column.);
Click on three dots (…);
Select ‘Edit preferences’ (Third item in list.);
Click on ‘Prioritise who to see first.’ (First item.);
Select those whose posts are to be displayed first.

Note: There are several other options which are self-explanatory.


Overall, it is primarily interaction (user’s own and others) that will govern which posts a user sees. Consequently, for example, a lengthy comment on a photograph may result in it being given higher status than a video with less interaction.


Some have expressed concern that relying upon user interaction may reduce the spectrum of information displayed because it would probably result in them only seeing content that reinforces their own ideologies. They would therefore not be exposed to broader, alternative, opinions and arguments about important issues and topics.


There is further concern that, though part of the change is aimed at reducing ‘fake’ and ‘bogus’ news content, these may still be spread if a friend or relative ‘shares’ such a post and if it is one that has been widely commented on.


How this change is viewed by the general, private user is entirely down to what they want to get out of their Facebook account. For those who, primarily, just wish to see content from friends and family, it will be a change in the right direction. However, for those who are looking for a broader, more informed perspective, it may be viewed as detrimental.


Brands, Publishers, Media, Pages

It is more than likely, as a result of this change, ’business’ users of Facebook will experience less exposure. This is because a majority of their posts are seen to be effectively passive in that they primarily aim to gain attention or advertise products. As mentioned above, the new policy is to reduce the amount of ‘passive’ posts the average user is presented with in their newsfeed. As passive posts they generate far less, if any, interaction from regular users.


Naturally, this will impact commercial companies, and perhaps most will consider it fair because many large corporations have taken advantage of the Facebook ethos to, unasked, push their products in an annoying manner. However, there is concern with respect to smaller organisations.


Independent; non-profit; charitable; small business; etc. organisations and companies will, in the majority of instances, by virtue of how their Facebook accounts are set up, be identified as business users and, undoubtedly, their posts will be treated accordingly. For example, one small magazine owner has already raised the issue because, due to their publisher (company) size and the decreasing number of physical news stands on the high street, they rely on social media. He states most potential subscribers only find their site by virtue of posts in news feeds. It took a while for them to grow there customer base and to become financially viable. The prospect is now, with the de-emphasising of posts like theirs that they will fail to gain new subscribers, will consequently lose income and probably their livelihood. It is inevitable, non-profits and charities will also see a reduction in contributions.


In view of the principle aims for this website, it is only right authors be mentioned. It is likely this change will impact independent authors (and others) who use ‘pages’ for their product profiles (author, book, etc.). Facebook Profile or Page? includes thoughts upon how an author may use their personal Facebook account instead of a page for publicising themselves and their books.


Just to be cynical for a moment. Some have implied Facebook is just an advertising company pretending to be a social service. A little harsh though it must be acknowledged Facebook is now more of a business than previously. As such it inevitably has to look to the aspect of profit. Could it be this change will lead to brands etc. being pushed to pay for broader exposure and advertising? Cynical perhaps but a realistic prospect. However, this will not be of concern to general users for whom the change has potentially been made.


Conclusion

For the majority of general, average, personal users the change is welcome.


Friends and family will see more interaction and thereby be able to keep up to date with each others progressive lives.


News Feed content will be less varied and broad though users have the option to enhance what they see.


Businesses will have less exposure though they have the option to utilise Facebook’s advertising services.


Independent, non-profit, charitable, etc. organisations may be negatively impacted.


Whatever a user’s opinion on this change, all should be grateful Facebook is listening to concerns and is proactive in attempting to deal with some of the issues.

 •  0 comments  •  flag
Share on Twitter
Published on January 23, 2018 09:20

January 19, 2018

Biographical Fiction

[image error]


In this article two primary aspects will be considered: Why the genre of ‘Biographical Fiction’ exists and How to go about structuring a manuscript for this genre.


To set the matter in context: By very definition the content of autobiographical, biographical and memoir books must be entirely truthful and based upon real people, events and facts. For them to be otherwise would be misleading and unfair to readers. The fact a reader selected a book in one of these genre is indicative of their desire to read about real people and true life events: they are not looking for a fictional tale.


It may also help to clarify terminology: Whether agreed with or not, it must be accepted, in today’s society, many utilise the term ‘memoir’ to include autobiography and biography as well as memoir. The differences?


Autobiography: Where the author is telling their Own life story.


Biography: Where someone recounts the life story of another person.


Memoir: The author records one event or a series of connected occurrences from their life but not their complete life story (their autobiography).


As stated, even if some would prefer the correct identifying term be utilised, it is necessary to acknowledge common usage and to accept a ‘Memoir’ may contain any or all of the above elements.


Why Biographical Fiction?

Biographical Fiction is not a new concept though, in the past, such books were commonly identified as fiction. Take Charles Dickens’s book David Copperfield, considered a ‘classic’ in the world of literature. It is well known parts are based upon his own family and experiences: The character of Mr Micawber is modelled upon his own father; and can anyone miss the similarities between David Copperfield’s struggles to become a successful author and Dickens’s own? This is certainly not the only example to be found in literature. Many established authors have drawn upon and included their own and other ‘real’ people’s experiences to create realistic and meaningful characters and situations.


With the description of ‘Biographical Fiction’ there can be no mistaking intent. Any reader selecting a book from this genre will be looking for an entertaining read that has elements of truth in it or, at least, is partly based upon fact. The term itself should avoid any misunderstanding as to the style of a book’s content.


Why authors chose to write Biographical Fiction

There may be any number of reasons an author will opt for this alternative to that of memoir etc. It may be because:



They are unable to recall all the facts accurately. (Time can blur remembrances.)
They are unable to fully determine the accuracy or truth of some person, event or occasion. (Principally when writing about someone else.)
They consider the truth alone would not make for an interesting or entertaining read.
They wish to conceal some facts and/or identities. (For privacy or to protect those mentioned from public exposure.)

The reasons can be as varied and as unique as the authors themselves. No doubt other possibilities will readily come to the reader’s mind.


Structuring Biographical Fiction

As implied in the name, a biographical fiction book must be based upon, and have its foundations in, real people and true events. Of course, that is not to say there may not be additional fictional characters and occurrences included but, overall, the tale must be rooted in reality.


An author check list:

Decide which lives and events to write about.
Will it be a full epic or just one or two events.
Which format will best suit the tale: novel, novelette or short story.
Decide exactly what to include and, more importantly, what not to include.
Plot where to start and where to end.
Decide upon chronology: whether it will be linear or not. (E.g. will throwbacks be utilised?)
Research all facts and aspects where not personally known or if in the least bit unsure.

Plot has been mentioned in point 5. In general the normal story structure should be followed: beginning-middle-end. If suitable, it is suggested the author starts and ends with something that is based upon fact rather than fiction. After all most experiences, if they are worth the telling, have the tendency to be dramatic in there own right and it is primarily these that should be drawn out.


It is suggested, before commencing the book proper, the author creates a rough plot point outline utilising the true events first. Subsequently, fictional plot point elements may then be inserted. Thereafter, the author may give full rein to their creative muse and ability.


Entertainment value

Unless a non-fiction, authors should bare in mind books are generally seen as a means of entertainment. Story telling has been part of every society and culture since time began and have always been seen as something to be enjoyed. Consequently, authors need to ensure their book has at least some element of entertainment. Books are also seen as a means of distraction from the rudimentary toils and tasks of everyday life: most readers will not want to read about dull, mundane lives that are similar to their own. They want to be inspired and to know hope exists and is not always disappointed. Biographical fiction, well come to that autobiography, biography and memoir, are no different. The reader may have a genuine interest in the subject matter but will, at the same time, either consciously or subconsciously, be looking for some form of escapism. This is perhaps just one of the elements where the biographical fiction author has the advantage.


Litigation

Concern regarding the use of real names (people and locations) and of actual identifiable historic events in books frequently arises. The principle worry regards the possibility of being sued for Defamation of Character (incorporates Slander and Libel); Invasion of Privacy or Malice. Naturally, it is primarily authors of autobiography, biography and memoir who deliberate the issue. However, the situation is no different with biographical fiction, or in fact with any book. Of course, author’s, if their characters are to be realistic, will undoubtedly base descriptions, mannerisms, habits, idiosyncrasies, etc. upon observations of ‘real’ people. However, to avoid any possibility of causing offence or raising the possibility of litigation, these must not be such as to make an actual person identifiable. How would the author feel if it was them being described? The best way to achieve this is to utilise a variety of characteristics from different people to create a given fictional character.


includes more detailed information upon the topic of litigation.


Enthusiasm

When first setting out on a project it is easy for an author to get carried away: who does not dream of having a best selling novel. However, sometimes a short story or novelette may be more appropriate. With biographical fiction the author is free to let their imagination run wild with little constraint except, of course, to ensure the factual parts are accurate. Though this can be, and usually is, fun, the story needs to be believable and within the bounds of the event(s) the author is attempting to portray. In addition, as already mentioned, the author should not forget the normal principles (some would say rules though that is considered too constraining) in formatting a tale: beginning-middle-end.


Conclusion

Biographical fiction is a free form, fun way (for both author and reader) to relate true events and facts within a fictitious framework.


It is important actual true occurrences, no matter how extensive or limited, are faithfully conveyed.


Descriptions of people and locations should be carefully considered so as not to cause or result in: upset, embarrassment, a breach of privacy or undue public exposure or to open the potential for litigation.


The correct format should also be carefully considered: Novel; Novelette; Short Story; Essay and the author should ensure the fictitious content complements (gels) with the facts.


Biographical fiction is not only fun but also has the advantage of opening stories to a broader readership: Real/True life enthusiasts and those who simply enjoy a good tale.

 •  0 comments  •  flag
Share on Twitter
Published on January 19, 2018 09:10